cpe:/a:hp:icewall_federation_agent:3.0 cpe:/a:hp:icewall_mcrp:3.0 cpe:/a:hp:icewall_sso:10.0::~~certd~~~ cpe:/a:hp:icewall_sso:10.0::~~dfw~~~ cpe:/a:hp:icewall_sso_agent_option:10.0 cpe:/a:nodejs:node.js:6.6.0 cpe:/a:openssl:openssl:1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1 cpe:/a:openssl:openssl:1.0.1:beta2 cpe:/a:openssl:openssl:1.0.1:beta3 cpe:/a:openssl:openssl:1.0.1a cpe:/a:openssl:openssl:1.0.1b cpe:/a:openssl:openssl:1.0.1c cpe:/a:openssl:openssl:1.0.1d cpe:/a:openssl:openssl:1.0.1e cpe:/a:openssl:openssl:1.0.1f cpe:/a:openssl:openssl:1.0.1g cpe:/a:openssl:openssl:1.0.1h cpe:/a:openssl:openssl:1.0.1i cpe:/a:openssl:openssl:1.0.1j cpe:/a:openssl:openssl:1.0.1k cpe:/a:openssl:openssl:1.0.1l cpe:/a:openssl:openssl:1.0.1m cpe:/a:openssl:openssl:1.0.1n cpe:/a:openssl:openssl:1.0.1o cpe:/a:openssl:openssl:1.0.1p cpe:/a:openssl:openssl:1.0.1q cpe:/a:openssl:openssl:1.0.1r cpe:/a:openssl:openssl:1.0.1s cpe:/a:openssl:openssl:1.0.1t cpe:/a:openssl:openssl:1.0.2 cpe:/a:openssl:openssl:1.0.2:beta1 cpe:/a:openssl:openssl:1.0.2:beta2 cpe:/a:openssl:openssl:1.0.2:beta3 cpe:/a:openssl:openssl:1.0.2a cpe:/a:openssl:openssl:1.0.2b cpe:/a:openssl:openssl:1.0.2c cpe:/a:openssl:openssl:1.0.2d cpe:/a:openssl:openssl:1.0.2e cpe:/a:openssl:openssl:1.0.2f cpe:/a:openssl:openssl:1.0.2h cpe:/o:novell:suse_linux_enterprise_module_for_web_scripting:12.0 CVE-2016-6306 2016-09-26T15:59:02.910-04:00 2018-07-13T21:29:00.690-04:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2016-10-18T10:52:54.373-04:00 SECTRACK 1036885 BID 93153 FREEBSD FreeBSD-SA-16:26 GENTOO GLSA-201612-16 REDHAT RHSA-2016:1940 REDHAT RHSA-2018:2185 REDHAT RHSA-2018:2186 REDHAT RHSA-2018:2187 SUSE SUSE-SU-2016:2470 CONFIRM http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21995039 CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html CONFIRM http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html CONFIRM http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html CONFIRM https://bto.bluecoat.com/security-advisory/sa132 CONFIRM https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9 CONFIRM https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 CONFIRM https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 CONFIRM https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ CONFIRM https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us CONFIRM https://www.openssl.org/news/secadv/20160922.txt CONFIRM https://www.tenable.com/security/tns-2016-16 CONFIRM https://www.tenable.com/security/tns-2016-20 CONFIRM https://www.tenable.com/security/tns-2016-21 The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.